The Community for Technology Leaders
Policies for Distributed Systems and Networks, IEEE International Workshop on (2007)
Bologna, Italy
June 13, 2007 to June 15, 2007
ISBN: 0-7695-2767-1
TABLE OF CONTENTS
Introduction

Preface (PDF)

pp. ix

Committees (PDF)

pp. x
Invited Talks

Autonomous Pervasive Systems and the Policy Challenges of a Small World! (Abstract)

Morris Sloman , Imperial College London, UK
Joe Sventek , University of Glasgow, UK
Emil Lupu , Imperial College London, UK
Naranker Dulay , Imperial College London, UK
pp. 3-7

Policy-Driven Distributed Authorization: Status and Prospects (Abstract)

Marianne Winslett , University of Illinois at Urbana-Champaign, USA
pp. 12-18
Session I: Modeling Policies

Specifying Policies Using UML Sequence Diagrams--An Evaluation Based on a Case Study (Abstract)

Dag Elgesem , University of Bergen, Norway
Bjornar Solhaug , University of Bergen, Norway; SINTEF ICT, Norway
Ketil Stolen , SINTEF ICT, Norway; University of Oslo, Norway
pp. 19-28

A Socio-cognitive Approach to Modeling Policies in Open Environments (Abstract)

Tatyana Ryutov , University of Southern California, USA
pp. 29-38

On Interoperable Trust Negotiation Strategies (Abstract)

Marco Faella , Universita di Napoli, Italy
Piero A. Bonatti , Universita di Napoli, Italy
Sabrina Baselice , Universita di Napoli, Italy
pp. 39-50
Session II: Policy Design and Management (Short Papers)

Handling Dynamic Organizational Change with Community-Based Policy Management (Abstract)

Vincent Wade , Trinity College Dublin, Ireland
Kevin Feeney , Trinity College Dublin, Ireland
David Lewis , Trinity College Dublin, Ireland
pp. 56-60

Expertise Knowledge-Based Policy Refinement Process (Abstract)

Taufiq Rochaeli , Darmstadt University of Technology, Germany
Claudia Eckert , Darmstadt University of Technology, Germany
pp. 61-65

Infrastructure-Aware Autonomic Manager for Change Management (Abstract)

K. Maly , Old Dominion University
R. Mukkamala , Old Dominion University
H. AbdelSalam , Old Dominion University
M. Zubair , Old Dominion University
pp. 66-69

Towards Privacy-Aware Handling of Authorizations (Abstract)

Gunther Pernul , University of Regensburg, Germany
Wolfgang Dobmeier , University of Regensburg, Germany
pp. 70-76
Session III: XML-Based Policies

XACML-Based Composition Policies for Ambient Networks (Abstract)

Ramide Dantas , Universidade Federal de Pernambuco, Brazil
Djamel Sadok , Universidade Federal de Pernambuco, Brazil
Carlos Kamienski , Universidade Federal do ABC, Brazil
Borje Ohlman , Ericsson Research, Sweden
Joseane Fidalgo , Universidade Federal de Pernambuco, Brazil
pp. 77-86

Overriding of Access Control in XACML (Abstract)

Erik Rissanen , Swedish Institute of Computer Science, Sweden
Babak Sadighi , Swedish Institute of Computer Science, Sweden
Ja'far Alqatawna , Swedish Institute of Computer Science, Sweden
pp. 87-95

A Multi-level Policy Representation for Management Services in Maritime Networks (Abstract)

David Kidston , Communications Research Centre, Canada
Isabelle Labbe , Communications Research Centre, Canada
Francis St-Onge , Communications Research Centre, Canada
pp. 96-108
Session IV: SW Policy Languages

Privacy in the Semantic Web: What Policy Languages Have to Offer (Abstract)

Nahid Shahmehri , Linkopings Universitet, Sweden
Claudiu Duma , Linkopings Universitet, Sweden
Almut Herzog , Linkopings Universitet, Sweden
pp. 109-118

Specifying and Enforcing High-Level Semantic Obligation Policies (Abstract)

Anand Ranganathan , IBM T.J. Watson Research Center, USA
Anton Riabov , IBM T.J. Watson Research Center, USA
Zhen Liu , IBM T.J. Watson Research Center, USA
pp. 119-128

Proteus: A Semantic Context-Aware Adaptive Policy Model (Abstract)

Rebecca Montanari , Universita di Bologna, Italy
Lalana Kagal , MIT CSAIL, USA
Alessandra Toninelli , Universita di Bologna, Italy
Ora Lassila , Nokia Research Center Cambridge, USA
pp. 129-140
Session V: Policy Enforcement

Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall (Abstract)

Apu Kapadia , Dartmouth College, USA
Prasad Naldurg , Microsoft Research, India
Roy H. Campbell , University of Illinois at Urbana-Champaign, USA
pp. 141-150

An Automated Framework for Validating Firewall Policy Enforcement (Abstract)

Zein Wali , DePaul University, USA
Adel El-Atawy , DePaul University, USA
Frank Lin , Cisco, California, USA
Sheng Li , Cisco, California, USA
Christopher Pham , Cisco, California, USA
Taghrid Samak , DePaul University, USA
Ehab Al-Shaer , DePaul University, USA
pp. 151-160

Deriving Enforcement Mechanisms from Policies (Abstract)

Francois Siewe , De Montfort University, UK
Antonio Cau , De Montfort University, UK
Hussein Zedan , De Montfort University, UK
Helge Janicke , De Montfort University, UK
pp. 161-172
Session VI: Policy Analysis and Semantic Enhancements (Short Papers)

Data-Purpose Algebra: Modeling Data Usage Policies (Abstract)

Daniel Weitzner , Massachusetts Institute of Technology, USA
Gerald Jay Sussman , Massachusetts Institute of Technology, USA
Chris Hanson , Massachusetts Institute of Technology, USA
Tim Berners-Lee , Massachusetts Institute of Technology, USA
Lalana Kagal , Massachusetts Institute of Technology, USA
pp. 173-177

XACML Function Annotations (Abstract)

Prathima Rao , Purdue University, USA
Elisa Bertino , Purdue University, USA
Dan Lin , Purdue University, USA
pp. 178-182

Using SAML and XACML for Complex Resource Provisioning in Grid Based Applications (Abstract)

Leon Gommans , University of Amsterdam, Netherlands
Cees de Laat , University of Amsterdam, Netherlands
Yuri Demchenko , University of Amsterdam, Netherlands
pp. 183-187

Web Rule Languages to Carry Policies (Abstract)

Dragan Gasevic , Simon Fraser University Surrey, Canada
Gerd Wagner , Brandenburg University of Technology, Germany
Marek Hatala , Simon Fraser University Surrey, Canada
Nima Kaviani , Simon Fraser University Surrey, Canada
pp. 188-192

Policy Analysis Using a Hybrid Semantic Reasoning Engine (Abstract)

Kris Verlaenen , Katholieke Universiteit Leuven, Belgium
Wouter Joosen , Katholieke Universiteit Leuven, Belgium
Bart De Win , Katholieke Universiteit Leuven, Belgium
pp. 193-200
Session VII: Policy Negotiation and Resolution

Authorisation and Conflict Resolution for Hierarchical Domains (Abstract)

Naranker Dulay , Imperial College London, UK
Changyu Dong , Imperial College London, UK
Giovanni Russello , Imperial College London, UK
pp. 201-210

Policy-Driven Negotiation for Authorization in the Grid (Abstract)

Frank Siebenlist , Argonne National Laboratory, USA
Daniel Olmedilla , L3S Research Center, Germany
Ionut Constandache , Duke University, USA
pp. 211-220

Performance Evaluation of Privacy-Preserving Policy Reconciliation Protocols (Abstract)

Jonathan Voris , Stevens Institute of Technology, USA
Susanne Wetzel , Stevens Institute of Technology, USA
Ulrike Meyer , Siemens Networks GmbH & Co, Germany
Sotiris Ioannidis , Stevens Institute of Technology, USA
pp. 221-228

Identity Delegation in Policy Based Systems (Abstract)

Shourya Roy , IBM India Research Lab, India
Manish Bhide , IBM India Research Lab, India
Rajeev Gupta , IBM India Research Lab, India
pp. 229-240
Session VIII: Applications (Short Papers)

Towards Effective Security Policy Management for Heterogeneous Network Environments (Abstract)

Gail-Joon Ahn , University of North Carolina at Charlotte, USA
Lawrence Teo , University of North Carolina at Charlotte, USA
pp. 241-245

A Policy-Driven Trading Framework for Market-Based Spectrum Assignment (Abstract)

Tim Forde , University of Dublin, Ireland
Linda Doyle , University of Dublin, Ireland
Patroklos Argyroudis , University of Dublin, Ireland
Donal O'Mahony , University of Dublin, Ireland
pp. 246-250

On Automated Policy Generation for Mobile Ad Hoc Networks (Abstract)

Richard Lo , U.S. Army CERDEC
Shihwei Li , Telcordia Technologies
Gary Levin , Telcordia Technologies
Ritu Chadha , Telcordia Technologies
Scott Newman , U.S. Army CERDEC
Cho-Yu J. Chiang , Telcordia Technologies
Yitzchak M. Gottlieb , Telcordia Technologies
Alex Poylisher , Telcordia Technologies
pp. 256-260

CoRaL--Policy Language and Reasoning Techniques for Spectrum Policies (Abstract)

Grit Denker , SRI International, USA
Rukman Senanayake , SRI International, USA
Mark-Oliver Stehr , SRI International, USA
Carolyn Talcott , SRI International, USA
David Wilkins , SRI International, USA
Daniel Elenius , SRI International, USA
pp. 261-265

Dynamic Adaptation of Policies in Data Center Management (Abstract)

Wael Hosny Fouad Aly , The University of Western Ontario, Canada
Hanan Lutfiyya , The University of Western Ontario, Canada
pp. 266-272
Posters

Analysis of Policy and Standards for Joint C4ISR Network Technologies (PDF)

Marion G. Ceruti , Senior Member, IEEE; Space and Naval Warfare Systems Center, San Diego, USA
Y. Meriah Arias-Thode , Space and Naval Warfare Systems Center, San Diego, USA
LorRaine Duffy , Space and Naval Warfare Systems Center, San Diego, USA
pp. 273

Towards Learning Privacy Policies (PDF)

Alessandra Russo , Imperial College London, UK
Emil C. Lupu , Imperial College London, UK
Arosha K. Bandara , The Open University, UK
pp. 274

DUKE--Distributed Usage Control Enforcement (PDF)

Manuel Hilty , ETH Zurich, Switzerland
Christian Schaefer , DoCoMo Euro-Labs, Germany
Thomas Walter , DoCoMo Euro-Labs, Germany
Alexander Pretschner , ETH Zurich, Switzerland
pp. 275

Policy-Based Parametric Firewall Configuration: A Real-Case Application (PDF)

Alessandro Provetti , Univ. di Messina, Italy
Romeo Penzo , Regione Lombardia, Italy
Massimo Marchi , Univ. di Milano, Italy
pp. 276

Hybrid Multi-module Security Policy Verification (PDF)

Artem Tishkov , St. Petersburg Institute for Informatics and Automation, Russia
Ekaterina Sidelnikova , St. Petersburg Institute for Informatics and Automation, Russia
Olga Chervatuk , St. Petersburg Institute for Informatics and Automation, Russia
Igor Kotenko , St. Petersburg Institute for Informatics and Automation, Russia
pp. 277

Towards Practical Security Monitors of UML Policies for Mobile Applications (PDF)

Katsiaryna Naliuka , University of Trento, Italy
Fabio Massacci , University of Trento, Italy
pp. 278

Towards an Approach for Hybrid Trust Model (PDF)

Xavier Serpaggi , Ecole Nationale des Mines de Saint-Etienne, France
Philippe Jaillon , Ecole Nationale des Mines de Saint-Etienne, France
Marc Roelens , Ecole Nationale des Mines de Saint-Etienne, France
Hoan Vu , Ecole Nationale des Mines de Saint-Etienne, France
pp. 279

POSITIF: A Policy-Based Security Management System (PDF)

Antonio Lioy , Politecnico di Torino, Italy
Gregorio Martinez Perez , Universidad de Murcia
Antonio F. Gomez Skarmeta , Universidad de Murcia
Cataldo Basile , Politecnico di Torino, Italy
Felix J. Garcia Clemente , Universidad de Murcia
pp. 280

Adaptive Web Data Extraction Policies (PDF)

Alessandro Provetti , Univ. di Messina, Italy
Massimo Marchi , Univ. di Milano, Italy
Giacomo Fiumara , Univ. di Messina, Italy
pp. 281
Author Index

Author Index (PDF)

pp. 283
110 ms
(Ver 3.3 (11022016))